Results 71 to 80 of about 51,827 (294)
Securing Cloud from Cloud Drain
Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to their customers. To mitigate these issues,
Das, Niva, Sarkar, Tanmoy
openaire +2 more sources
Cloud Access Security Brokers (CASBs): Enhancing Cloud Security Posture
Cloud Access Security Brokers (CASBs): Enhancing Cloud ...
openaire +1 more source
Highly Secure In Vivo DNA Data Storage Driven by Genomic Dynamics
Integrated computational‐biological programming enables secure in vivo data storage by generating code tables from either genomes or gene regulatory networks, expanding the encryption key space by over 100 orders of magnitude. Storing code tables within synthetic genes, genomes, or gene regulatory networks adds an additional layer of security by ...
Jiaxin Xu +9 more
wiley +1 more source
Principles for Rigorous Design and Application of Synthetic Microbial Communities
SynComs are artificially designed to enable inter‐species metabolic interactions, metabolic division of labor, and ecological interactions that can elicit phenotypes like colonization stability and environmental adaptation. This systematic review explores the processes used to construct SynComs, the assessment of the mechanisms of metabolic interaction
Yuxiao Zhang +21 more
wiley +1 more source
Data Security and Privacy in Cloud Computing
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe.
Yunchuan Sun +3 more
doaj +1 more source
ADAPTIVE RESOURCE ALLOCATION METHOD FOR DATA PROCESSING AND SECURITY IN CLOUD ENVIRONMENT
Inna Petrovska, Heorhii Kuchuk
openalex +2 more sources
Phenyl and vinyl groups are used to modify conventional polydimethylsiloxane (PDMS) to yield poly(methylphenylvinylsiloxane) (PMPVS). PMPVS‐based gecko‐inspired arrays with mushroom tips exhibit superior adhesion strength of 36.7 kPa even at −80 °C, which enhances by 5143% compared to PDMS‐based arrays (0.7 kPa at −70 °C).
Jiabao Feng +6 more
wiley +1 more source
In middle age, testicular CMKLR1⁺ macrophages exhibited a pro‐inflammatory immunometabolic profile, mediated by adipose signals associated with high BMI. However, inhibition of CMKLR1 signaling, either through Cmklr1 genetic ablation or treatment with a CMKLR1 antagonist peptide, can reverse this phenotype.
Zhendong Zhu +10 more
wiley +1 more source
Efficient Dynamic Bloom Filter Hashing Fragmentation for Cloud Data Storage
Security is important in cloud data storage while using the cloud services provided by the service provider in the cloud. Most of the research works have been designed for a secure cloud data storage.
Jegadeeswari S. +2 more
doaj +1 more source
Security Enhancement and PaaS platform Authentication in Cloud Computing based On SBA [PDF]
Ramdas Vankdothu, Mohd Abdul Hameed
openalex +1 more source

